Share:

This is a great article, at least I think so – ‘AI and ML choices can greatly impact data security‘ offers an opinion on the pluses and minuses of using artificial intelligence (AI) and machine learning (ML) to aid in the identification and remediation of security vulnerabilities.…

In 2018, over 128,400 medical patients were victims of a successful phishing attack. All personal information was accessed, both health and financial. Not a big deal anymore in the daily news, except, of course, to the victims.…

Not to give away my age, but do you remember the nursery rhyme, ‘Oh where, oh where has my little dog gone? Oh where, oh where can he be?’ Well, if we apply this to organizations’ data, most have no idea where their data is.…

The EU is at it again. The ePrivacy Regulation (ePR), which originally should have been finalized on the date of the enforcement of the General Data Protection Regulation GDPR, 25 May 2018, is under review. Its purpose is to specifically protect the confidentiality of electronic communications.…

This is Part Two of a two-part blog, with suggestions from cybersecurity experts on how you can proactively manage the growing problem of third-party data breaches. Read about the risks in Part One of the blog.…

Company Overview

CONCEPT SEARCHING HOLDS A MICROSOFT GOLD APPLICATION DEVELOPMENT COMPETENCY AND IS A PARTNER IN THE ELITE BUSINESS CRITICAL SHAREPOINT PARTNER PROGRAM. OUR AWARD WINNING CONCEPTCLASSIFIER FOR SHAREPOINT IS AVAILABLE IN ALL VERSIONS OF SHAREPOINT.